










Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CTS 234 Final Exam Latest Update With Complete Solution
Typology: Exams
1 / 18
This page cannot be seen from the preview
Don't miss anything!
Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. True or false? - ANSWER True
Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory Domain. True or false? - ANSWER False
To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. True or false? - ANSWER False
You need multiple boot images on a WDS server, one for each operating system. True or false? - ANSWER False
Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs.
Where will the virtual machine configuration files be stored? - ANSWER E:\VMs\Virtual Machines
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.
Why does Dmitry's computer reboot the second time? - ANSWER To allow Hyper-V to start the host operating system
Block storage can easily be shared by several different Web apps, virtual machines, or containers. True or false? - ANSWER False
The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. True or false? - ANSWER False
Container images that are based on Nano Server must be run as Hyper-V containers. True or false? - ANSWER True
LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container. True or false? - ANSWER True
To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor. True or false? - ANSWER False
TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data.
Which of the following is true of this scenario? - ANSWER The TravelBugz app communicates with the Web app using the TCP/IP protocol.
VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines,
on a platform managed by a cloud service provider.
Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app? - ANSWER FTP Server
Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning.
Which of the following is most likely causing this issue? - ANSWER The FQDN in the HTTPS certificate does not match the Web server FQDN.
Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website.
Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website? - ANSWER The first website is using port 443, so the second website cannot use the same port.
Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website.
Which of the following IIS configuration features should Britta use? -
ANSWER Error Pages
Asher, a system administrator, wants to run containers on Windows Server
Which of the following is a service that will help Asher manage and run Docker containers on the server? - ANSWER Docker daemon
Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition — either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module.
Which of the following justifies Ezra's choice? - ANSWER Ezra intends to run Linux containers on the server.
Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window:
PS C:> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force
PS C:> Install-Package -Name docker -ProviderName DockerMsftProvider
Identify the correct code that should replace XXXX. - ANSWER Repository
Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub.
Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? - ANSWER Theodore used the sudo passwd root command.
Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server.
Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change? - ANSWER apachect configtest
You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container.
Which of the following is true of this scenario? - ANSWER The Linux kernel provided by Docker runs on the Hyper-V hypervisor.
You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the
docker images command.
What will be the result in this scenario? - ANSWER The list of Windows container images will be displayed.
Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks.
Which of the following options should Merlyn choose? - ANSWER SaaS
Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud.
Which of the following options should Lin choose? - ANSWER She should install a small footprint virtual machine.
When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. True or false? - ANSWER False
client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router.
In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? - ANSWER Demarcation point
Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? - ANSWER The NAT router should be a Next Generation Firewall
You are configuring a Windows Server 2016 VPN server using L2TP and NAT.
Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? - ANSWER 1701/TCP
Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method.
Which of the following methods should Kyra ensure is supported on both the
client and the server? - ANSWER Extensible Authentication Protocol (EAP)
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory.
What RAS capability will allow the organization's applications to be accessible to users outside of the organization? - ANSWER Web Application Proxy
Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router.
When configuring the remote access server, which of the following is Lashonda most likely to do? - ANSWER She will select the Demand-dial connections service.
You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service.
On the next configuration screen, which of the following services should you
Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties.
In which of the following circumstances will this permission be used? - ANSWER When a user account has the Control access through NPS Network Policy option set
The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers.
Which of the following options should Samir use? - ANSWER DirectAccess
Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN.
Which of the following is true of this scenario? - ANSWER The remote access
server also contains a network location server.
Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network.
Which of the following options should Damien configure on the Enable DirectAccess Wizard? - ANSWER Damien should not select the Use force tunneling option.
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess.
If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? - ANSWER Remote Clients
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? - ANSWER Remote Desktop Gateway
Aria is setting up a Remote Desktop Services server to allow users remote access to the server.
At what point in the installation process should Aria reboot the server? - ANSWER After selecting the role services that Aria wants to install
Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode.
If Michaela selects the Per User licensing mode, which of the following statements is true? - ANSWER Michaela's organization allows users to connect remotely using their personal computers.
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion,
complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session.
If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true? - ANSWER Jabez created a shared folder that is accessible to remote servers in the collection.
Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections.
If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? - ANSWER Rory used the Shadow option.
Isabella configures three virtual machines, VM1, VM2, AND VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database.